Managing multi-dimensional multi-granular security policies using data warehousing

Mahendra Pratap Singh, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya, Ussama Yakub

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

Over the last several years, sophisticated access control models have been proposed to take into account different dimensions such as time, space, role, context, attribute, etc. These enable specification of fine grained access control policies that can better express evolving organizational needs. However, there is no comprehensive solution that can uniformly specify, evaluate, maintain and analyze this multitude of policies in a consistent fashion. In this paper, we show that specifying and enforcing access control policies of multiple granularities and dimensions can be transformed into the problem of storing and querying data at multiple granularities and dimensions. Specifically, we develop a unified schema to represent several standard access control policies and show how they can be automatically evaluated. We have implemented the system in Oracle, and evaluated its scalability.

Original languageEnglish (US)
Title of host publicationNetwork and System Security - 9th International Conference, NSS 2015, Proceedings
EditorsShouhuai Xu, Meikang Qiu, Haibo Zhang, Moti Yung
PublisherSpringer Verlag
Pages221-235
Number of pages15
ISBN (Print)9783319256443
DOIs
StatePublished - 2015
Event9th International Conference on Network and System Security, NSS 2015 - New York, United States
Duration: Nov 3 2015Nov 5 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9408
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other9th International Conference on Network and System Security, NSS 2015
Country/TerritoryUnited States
CityNew York
Period11/3/1511/5/15

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Managing multi-dimensional multi-granular security policies using data warehousing'. Together they form a unique fingerprint.

Cite this